Whaling, Logic Bomb and Bait and Switch attack ?

Hello Dosto yaha hum apko kisi ek Ethical hacking ke kuch topic ke bare mai nahi btayege. Jaise Logic Bomb, whaling. Jinke bare mai jadatar btaya nahi jata hai. Agar aap ek ache Ethical hacker bana chahte hai tab apki inke bare mai jarur jana chahiye.

Note- This Post only for Educational purpose You don,t miss use Your Knowledge and Skills

Bait and Switch

Bait and Switch ek aisi technique hai. Jise hacker user ko aisi jagah redirect karva deta hai jaha user jana nahi chahta hai. Fake Advertisement ka use karke hacker sabse jada bait and Switch attack ko karte hai.

Jaise maan lijiye ek user hai veh kisi website par kuch padh raha hai. Usme use ek Advertisement show hota hai whatsapp hacking ka ab real mai veh whatsapp hacking ka koi method nahi hai. Veh hacker ke through bnaya gaya kisi type ke Virus hai ab normal user ko yeh nahi pata hoga.

Is tarah se jab veh user us advertisement par click karke hacker ki bnayi gayi kisi website par Redirect ho jata hai. Tab bait and switch attack kehlata hai. Is tarah se hacker user ko kisi bhi tarah ki aisi kisi website par redirect karva deta hai. Jaha user jana bhi nahi chahta ho.

Agar hum asan language mai kahe to aise mai user ko show kuch or hota hai or milta kuch or hai. Jaise advertisement hai kisi Tshirt ka or use open karne par kisi tarah ki apk download karne ko kaha jata hai. Is tarah se Bait and switch attack kiya jata hai. ise Click bait bhi kaha jata hai.

Also Read

What is Carding ?

What is Cryptography and their types ?

How hackers hack your bank account ?

Doxing

Yeh ek aisi technique hai jisme kisi user ki personal information ko collect kiya jata hai. Jise private kiya jata hai unhe Doxing ke through internet se nikala jata hai. Jaise maan lijiye apke pass koi number hai or apko uske bare mai information chahiye.

Tab aap Google par kuch strings ki help se us number ki information ko nikal sakte hai. Aise hi agar apki kisi website ke bare mai information chahiye. Tab bhi google ke through website ki information ko collect kiya ja sakta hai.

Doxing karne ke liye sabse acha tool Maltego mana jata hai. Maltego ek aisa tool hai jiski help se kisi ki information ko nikala ja sakta hai. Aap jab pahli bar iska use karte hai tab shayd apko kuch samjh mai nahi ayga. Kyoki yeh ek Forensic tool hai.

Jise information collect karne ke liye use kiya jata hai. iske bare mai apko CHFI mai bta diya jayga . Asan language mai agr kahe to Doxing veh hai. Jaha kisi ki aisi information ko nikala jata hai. Jise private kiya gaya hota hai ya phir kisi tarah se hide kiya gaya hota hai.

Whaling

Yeh ek type ka phishing attack hota hai. Lekin Whaling phishing mai hacker kisi aise person ko target bnata hai. Jiski kisi company ya organization mai bahut importance hoti hai. Jaise CEO ya manager Whaling mai hacker Social Media ya Google ke through apne target ke bare mai information ko collect karta hai. Uske baad Whaling attack ko kiya jata hai. Whaling phishing ko detect karna bhi bahut mushkil hota hai

Kyoki yeh kisi normal phishing attack ki tarah nahi hota hai. Phishing ke bare apko Facebook hacking ke article mai bta diya gaya hai . Whaling phishing mai hacker apne target ki information footprinting ke through nikal kar Phishing page ko is tarah se bnata hai or is tarah se Trusted emails ke through bheja jata hai. Jise user ko samjh tak nahi ata hai ki veh real hai ya fake hai.

Example of Whaling

Chaliye Whaling ko example ke through samjhte hai. Whaling attack ke bare mai jadatar nahi btaya jata hai. Jaise maan lijiye email spoofing ke through apko ek email ata hai. Kisi trusted mail ke through or message ata hai. Jisme genuine information hoti hai. Lekin link Phishing hota hai.

Jaise facebook ke through mail or genuine message password change ke liye ata hai. Is tarah se ek normal user ko yahi lagta hai. Veh facebook ke through bheja gaya mail hai. Tab veh apni information ko vaha fill karta hai. Is tarah se victim ko Whaling phishing ke through fsaya jata hai.

Whaling attack karne ke liye spoofing or social engineering ka use karke kiya jata hai. Whaling phishing karne se pahle hacker ko social engineering or spoofing ke bare mai jarur pata hona chahiye.

Phreaker

Aaj ke time mai iska naam shayd aap kabhi nahi sunte hoge. Kyoki phreaker hacking ki starting mai use kiya jata tha. Phreaker unhe kaha jata tha jo Phreaking attacks ko anjam dete the. Phreaking ka use tones mai kiya jata tha.

Whistle ya tones ke through Phreaking attack ko kiya jata tha. Jaise ki hacking ki starting bahut pahle hi ho gayi thi. 1960 mai hacking ki starting ho gayi thi us time jis tarah ke devices ka use kiya jata tha.

Logic Bomb , Whaling

Veh kisi tones ko hi samjh pate the inhi tones ka fayda utha kar hacking ko kiya jata tha. Phreaking attack ke through tones ki help se system ko bhi control kiya ja sakta tha. Pahle ke time mai use kiye jane vale phones ko bhi access kiya ja sakta tha.

Apne movies mai jarur dekha hoga kis tarah se kisi system ko hack karne ke liye alag alag tarah ki tones ko nikala jata tha. Yeh vahi tones hai jinka use karke phreaking attack phreakers ke through kiya jata tha. Aaj ke time mai yeh bahut hi rare use kiya jata hai. Lekin agar aap ethical hacker bana chahte hai to apko jarur pata hona chahiye ki hacking ki starting kaise hui thi.

Logic Bomb

Yeh ek tarah ka virus hota hai. Jo apke computer mai ata hai. Isliye apko iske bare mai jarur pata hona chahiye. Kyoki Logic Bomb apke computer mai hota hai. Lekin veh active tab tak nahi hota hai. Jab tak uske active hone ka time jo hacker ke through set kiya gaya hota hai. Veh nahi ata hai ya phir tab tak active nahi hota hai jab tak uska koi kaam nahi hota hai

Logic Bomb apke computer mai active hone ke baad apke computer ko infected karke hide kiya jata hai. Yeh ek tarah ka malcious program hota hai. Logic Bomb jab kisi system mai execute hota hai. Tab veh data ko corrupt or delete kar sakta hai. Logic bomb aye din naye naye tarah ke bnaye jate hai.

Logic Bomb , Whaling

Types of Logic Bomb

Zip bomb, SMS Bomb, Email Bomb. Yeh sabhi Logic Bomb mai hi ate hai. jaise Zip Bomb mai Zip file ke through system ko crash kiya jata hai. SMS Bombing mai SMS ke through kisi software ya application ko crash kiya jata hai.

Aise hi Email Bombing mai Email ke through crash kiya jata hai. Jaise ki har kisi software ki apni ek limit hoti hai. Jis tarah Dos attack mai limit se jada visitors ko send karke Website crash ki jati hai.

Thik usi trah Logic Bomb Virus mai kisi system ya software ki limit se jada request bhej kar unhe crash kiya jata hai. Jaise Zip file ko compress karke 1 MB ka bnaya gaya hai. Lekin jab use Extract kiya jata hai. Tab veh file 100 MB tak ki hoti hai. Aise mai system crash ho jata hai.

Kyoki 1 MB ki file mai is tarah malcious code ko compress kiya jata hai. Jo Extract karne ke baad active ho jate hai or system crash kar dete hai. Aise hi SMS or Email Bombing kaam karte hai. Logic Bomb ko asaan language mai samjhe to aisa bomb jo active hone par system crash kar sakte hai.

Stagefright

Stagefright ek aise vulnerability hai. Jiske through hacker kisi mobile phone ko MMS ke through hack kar sakte hai. Jis tarah SMS hote hai usi tarah MMS hote hai. MMS ka pura naam Multimedia Message Service hota hai. MMS ke through hum image ko send kar sakte hai.

Ab agar hacker steganography ke through kisi image mai kisi tarah ka malicious code ko inject karke send karte hai. Jaise ki mobile phone mai MMS Download hota hai. Tab veh image bhi download ho jati hai or Script background mai run ho jati hai.

Logic Bomb

Aise mai MMS ke through phone ko hack kiya ja sakta hai. Jab ki Stagefright vulnerability aaj ke time mai naye mobile phones mai nahi hoti hai. Lekin purane mobile phones mai Stagefright vulnerability aaj bhi apko dekhne ko mil jati hai.

Isliye apko iske bare mai pta hona chahiye. Stagefright vulnerability agar kisi Mobile phone mai hoti hai. Tab use MMS ke through hack karke Mobile phone ka access liya ja sakta hai. Jise data ko nuksan bhi ho sakta hai.

The Conclusion

Main umeed karta hu ki apko Logic Bomb, Phreaker, Whaling or kuch terms ke bare mai pata chal gaya hoga. Yeh sab apko isliye btaya gaya hai. Kyoki agar aap ek Ethical Hacker bana chahte hai. Tab apko inke bare mai jarur pata hona chahiye. Aap apni skills or Knowledge ka miss use kabhi mat kare.

Yeh sab knowledge apko apki Knowledge ko badhane ke liye btayi gayi hai. Isliye aap kabhi iska galt use mat karen. Agar apko yeh post achi lagti hai tab aap ise share jarur karen. Agar apka kisi bhi tarah ka koi question hai tab aap humse comment mai puch sakte hai.

Thankyou

Be the first to comment

Leave a Reply

Your email address will not be published.


*